%PDF-1.5
%
1 0 obj
<< /S /GoTo /D (section.1) >>
endobj
4 0 obj
(Introduction)
endobj
5 0 obj
<< /S /GoTo /D (section.2) >>
endobj
8 0 obj
(State of Art)
endobj
9 0 obj
<< /S /GoTo /D (section.3) >>
endobj
12 0 obj
(Visualization and analysis)
endobj
13 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
16 0 obj
(Types of programs)
endobj
17 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
20 0 obj
(Types of interactions)
endobj
21 0 obj
<< /S /GoTo /D (subsection.3.3) >>
endobj
24 0 obj
(The model of interaction)
endobj
25 0 obj
<< /S /GoTo /D (subsection.3.4) >>
endobj
28 0 obj
(The visualization method)
endobj
29 0 obj
<< /S /GoTo /D (subsection.3.5) >>
endobj
32 0 obj
(Intelligent analysis)
endobj
33 0 obj
<< /S /GoTo /D (subsection.3.6) >>
endobj
36 0 obj
(The prototype)
endobj
37 0 obj
<< /S /GoTo /D (section.4) >>
endobj
40 0 obj
(The experiment)
endobj
41 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
44 0 obj
(Windows Photo Viewer \(Windows 10 Home\))
endobj
45 0 obj
<< /S /GoTo /D (subsection.4.2) >>
endobj
48 0 obj
(Windows Media Player \(Windows 10 Home\))
endobj
49 0 obj
<< /S /GoTo /D (subsection.4.3) >>
endobj
52 0 obj
(VMware Workstation Pro 16)
endobj
53 0 obj
<< /S /GoTo /D (subsection.4.4) >>
endobj
56 0 obj
(Microsoft Office Professional Plus 2019)
endobj
57 0 obj
<< /S /GoTo /D (subsection.4.5) >>
endobj
60 0 obj
(Paint.Net)
endobj
61 0 obj
<< /S /GoTo /D (section.5) >>
endobj
64 0 obj
(Algorithms of analysis)
endobj
65 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
68 0 obj
(Detection of program clusters)
endobj
69 0 obj
<< /S /GoTo /D (subsection.5.2) >>
endobj
72 0 obj
(Detection of several unconnected sub-graphs of interactions)
endobj
73 0 obj
<< /S /GoTo /D (subsection.5.3) >>
endobj
76 0 obj
(Detecting the anomalies of outgoing interactions)
endobj
77 0 obj
<< /S /GoTo /D (subsection.5.4) >>
endobj
80 0 obj
(Detecting the anomalies of incoming interactions)
endobj
81 0 obj
<< /S /GoTo /D (subsection.5.5) >>
endobj
84 0 obj
(Determining the characteristics by external interactions)
endobj
85 0 obj
<< /S /GoTo /D (subsection.5.6) >>
endobj
88 0 obj
(Determining the cycles and their quantity)
endobj
89 0 obj
<< /S /GoTo /D (subsection.5.7) >>
endobj
92 0 obj
(Determination of trusted routes of interactions)
endobj
93 0 obj
<< /S /GoTo /D (subsection.5.8) >>
endobj
96 0 obj
(Classification of programs in terms of maliciousness)
endobj
97 0 obj
<< /S /GoTo /D (subsection.5.9) >>
endobj
100 0 obj
(Comparison of algorithms)
endobj
101 0 obj
<< /S /GoTo /D (section.6) >>
endobj
104 0 obj
(Discussion)
endobj
105 0 obj
<< /S /GoTo /D (section.7) >>
endobj
108 0 obj
(Conclusion)
endobj
109 0 obj
<< /S /GoTo /D (section.8) >>
endobj
112 0 obj
(Acknowledgement)
endobj
113 0 obj
<< /S /GoTo /D [114 0 R /Fit] >>
endobj
122 0 obj
<<
/Length 3180
/Filter /FlateDecode
>>
stream
xڭYIwFWpD/Ŗ#y,e MO `h̛ݵ/W_&ʍm
nv䥫 ߇b^Xoб}ӖJpӧٷّʺWmeS?=cZ;uRhqS;N$֮Z6\e^
ø]lwK};.F+H Ir]oVF597a2Dɫ)fcA2gw{arVDv;,pƉ7&_Q}u
թW뿷Ɯ{ɳB/UeĶe"+6pv9qG!9ىz7NvwڮzAqj'nAșuSu;#㥵a>c@q